Amazon and WhatsApp ‘falling short over privacy’, says pressure group | Technology | The Guardian

The two companies – one that handles private communications, the other the world’s largest retailer with a track record of good customer service – were criticised for not having strong public policies around the notification of government data requests. They were also criticised for not meeting the EFF’s benchmark for not selling out users and a lack of on-the-record policies to request judicial review of the gag orders that accompany NSLs, which are akin to subpoenas for user activity and have, the EFF says, contributed to the “widespread abuse of this investigatory tool” that can be deployed without judicial review.

Fuente: Amazon and WhatsApp ‘falling short over privacy’, says pressure group | Technology | The Guardian


Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


Campaign group to challenge UK over surrender of passwords at border control | Politics | The Guardian

The move comes after its international director, Muhammad Rabbani, a UK citizen, was arrested at Heathrow airport in November for refusing to hand over passwords. Rabbani, 35, has been detained at least 20 times over the past decade when entering the UK, under schedule 7 of terrorism legislation that provides broad search powers, but this was the first time he had been arrested.

Fuente: Campaign group to challenge UK over surrender of passwords at border control | Politics | The Guardian


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


Derechos Digitales — EEUU protege a las empresas y viola tu privacidad

http://derechosdigitales.tumblr.com/post/158753574406/eeuu-protege-a-las-empresas-y-viola-tu-privacidad

Hoy se realizó el lanzamiento del índice de responsabilidad corporativa Ranking Digital Rights 2017, el cual evalúa 22 de las compañías de telecomunicaciones, internet y telefonía móvil, más poderosas del mundo. Pero al mismo tiempo, el senado estadounidense votó a favor de la eliminación de las normas de privacidad de banda ancha que exigían a las empresas prestadoras de servicios de internet (ISP), consentimiento explícito de sus usuarios, para vender o compartir sus datos de navegación web con anunciantes y terceros.


Trump promulga ley que permite a empresas de internet vender datos de sus usuarios – El Mostrador

La norma, aprobada por la mayoría republicana en el Congreso la semana pasada, revoca un reglamento que los demócratas habían redactado para la Comisión Federal de Comunicaciones.

Fuente: Trump promulga ley que permite a empresas de internet vender datos de sus usuarios – El Mostrador


Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian

From Russian hacking to WikiLeaks, Edward Snowden and CIA cyber weapons, does digital surveillance mean the end of privacy?

Fuente: Wiretaps, data dumps and zero days: is digital privacy no longer possible? – video | World news | The Guardian


Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador

Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.

Fuente: Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador


Lawsuit Seeks Transparency as Searches of Cellphones and Laptops Skyrocket at Borders

A number of recent cases in the media have revealed instances of U.S. citizens and others being compelled by CBP agents to unlock their devices for search. In some instances, people have claimed to have been physically coerced into complying, including one American citizen who said that CBP agents grabbed him by the neck in order to take his cellphone out of his possession.

Fuente: Lawsuit Seeks Transparency as Searches of Cellphones and Laptops Skyrocket at Borders


Relator especial de la ONU pide que la privacidad sea una prioridad para los gobiernos del mundo | R3D: Red en Defensa de los Derechos Digitales

“Hay poca o ninguna evidencia para persuadirme de la eficacia o la proporcionalidad de algunas medidas extremadamente intrusivas presentes en las nuevas leyes de privacidad de Francia, Alemania, el Reino Unido y los Estados Unidos”, asegura Cannataci, en un comunicado de la Oficina del Alto Comisionado de Derechos Humanos de la ONU.

Fuente: Relator especial de la ONU pide que la privacidad sea una prioridad para los gobiernos del mundo | R3D: Red en Defensa de los Derechos Digitales


Protección de datos: una buena noticia a medias, en un Chile a medias | Derechos Digitales

La tan esperada propuesta de actualización de la normativa de protección de datos personales en Chile es una de esas buenas noticias que solo satisfacen a medias, porque llega tarde, y en forma incompleta, a hacerse cargo de una realidad urgente de abuso y desprotección.

Fuente: Protección de datos: una buena noticia a medias, en un Chile a medias | Derechos Digitales


Apple Says It Fixed CIA Vulnerabilities Years Ago

Yesterday, WikiLeaks released its latest batch of pilfered CIA material, five documents describing malicious software for taking over Apple MacBooks and iPhones, and wrote in an accompanying post that “the CIA has been infecting the iPhone supply chain of its targets,” prompting concerned readers to wonder if their iPhone or MacBook had been infected on the factory floor. In a statement, Apple says that is almost certainly not the case.

Fuente: Apple Says It Fixed CIA Vulnerabilities Years Ago


Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador

Bajo el nombre “Dark Matter” Wikileaks publicó una nueva tanda de documentos secretos, en los que detalla varios proyectos de la CIA para lograr infectar y “hackear” cualquier iPhone o Mac.

Fuente: Wikileaks filtra nuevos documentos secretos sobre cómo “hackeaba” la CIA cualquier iPhone o Mac – El Mostrador


Documents support fears of Muslim surveillance by Obama-era program | World news | The Guardian

Internal US law enforcement documents describe a highly controversial community initiative aimed at identifying potential terrorists before they “radicalize” as being intimately related to intelligence gathering.Despite years of official denials, American Muslim civil rights groups have claimed that Barack Obama’s Countering Violent Extremism (CVE) initiative was a euphemistic approach that targeted Muslims for surveillance.

Fuente: Documents support fears of Muslim surveillance by Obama-era program | World news | The Guardian


With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Fuente: With the latest WikiLeaks revelations about the CIA – is privacy really dead? | World news | The Guardian


Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian

“Theoretically, do I think that a director of the FBI who knows for a fact that something is a mythology but is misleading to the American people … should set the record straight? Yes, I do think he should say that, publicly,” Pelosi said

Fuente: Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian


WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.

Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian


Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices


WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.

Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador


La ciudad vigilada | The Santiago Times

Los alcaldes de las comunas acomodadas del sector oriente de Santiago han liderado una iniciativa por sumar tecnología de vigilancia a las medidas para reducir la delincuencia. Esta tendencia fue estrenada por las comunas de Lo Barnechea y Las Condes a mediados del año 2015, al instalar tres globos de video vigilancia de naturaleza militar en sus comunas. Luego de las elecciones municipales de 2016, el alcalde Felipe Alessandri anunció que un globo de similares características sería instalado en la comuna de Santiago, cuya implementación sigue pendiente. Este año el debate ha vuelto a la palestra pública luego del anuncio de las municipalidades de Las Condes y Providencia, quienes pretenden utilizar drones a control remoto equipados cámaras de alta resolución para vigilar los parques y calles de sus comunas para reducir la tasa de criminalidad.

Fuente: La ciudad vigilada | The Santiago Times


Fiscalía podrá acceder a correos electrónicos desde servidor de SQM – El Mostrador

“Se autorizó por parte del tribunal en el mes de febrero la revisión de los correos electrónicos del señor Patricio Contesse desde un servidor que se obtuvo desde Estados Unidos. Ahí hay más de tres millones de correos electrónicos que hay que revisar y analizar. En consecuencia, es una investigación compleja, ya que para analizar los correos hay que hacer una copia forense, tener programas especiales para segregar correos que han sido autorizados”, sostuvo la fiscal del caso SQM, Paola Castiglione.

Fuente: Fiscalía podrá acceder a correos electrónicos desde servidor de SQM – El Mostrador


My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia

La línea de muñecas “My Friend Cayla” ha sido prohibida en Alemania, luego que el gobierno del país europeo descubriera que éstas eran utilizadas para grabar y guardar datos de sus usuarios sin su consentimiento.

Fuente: My Friend Cayla: la muñeca prohibida en Alemania que espía a tu familia


Matthei anuncia que en Providencia habrá drones de vigilancia – Nacional – 24horas

La alcaldesa de Providencia, Evelyn Matthei, confirmó que la comuna implementará como medida para profundizar la seguridad en las calles el uso de drones “inteligentes”. La misión de los artefactos será patrullar puntos complicados de esta zona de la capital.

Fuente: Matthei anuncia que en Providencia habrá drones de vigilancia – Nacional – 24horas


Prominent Human Rights Activists in Egypt Targeted by Sophisticated Hacking Attacks

The campaign, which the reports call Nile Phish, coincides with an unprecedented crackdown on civil society in Egypt over the past few years, with non-governmental organizations and their staff being subjected to interrogations, arrests, travel bans, asset freezes, forced closures and a long-running trial over accusations of receiving foreign funding to destabilize the country.

Fuente: Prominent Human Rights Activists in Egypt Targeted by Sophisticated Hacking Attacks


Secret Docs Reveal: President Trump Has Inherited an FBI With Vast Hidden Powers

For example, the bureau’s agents can decide that a campus organization is not “legitimate” and therefore not entitled to robust protections for free speech; dig for derogatory information on potential informants without any basis for believing they are implicated in unlawful activity; use a person’s immigration status to pressure them to collaborate and then help deport them when they are no longer useful; conduct invasive “assessments” without any reason for suspecting the targets of wrongdoing; demand that companies provide the bureau with personal data about their users in broadly worded national security letters without actual legal authority to do so; fan out across the internet along with a vast army of informants, infiltrating countless online chat rooms; peer through the walls of private homes; and more. The FBI offered various justifications of these tactics to our reporters. But the documents and our reporting on them ultimately reveal a bureaucracy in dire need of greater transparency and accountability.

Fuente: Secret Docs Reveal: President Trump Has Inherited an FBI With Vast Hidden Powers


State of surveillance: privacy in Donald Trump’s America – tech podcast | Technology | The Guardian

With Barack Obama’s presidency coming to a close, Ewen MacAskill, the Guardian’s defence and intelligence correspondent, helps us explore what mass surveillance in America might look like under Donald Trump

Fuente: State of surveillance: privacy in Donald Trump’s America – tech podcast | Technology | The Guardian


In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance

The European Union’s top court has severely undermined the British government’s mass surveillance powers in a new ruling that could rein in police and spy agency investigations.In a judgment handed down in Luxembourg on Wednesday, the European Court of Justice declared that the “general and indiscriminate retention” of data about people’s communications and locations was inconsistent with privacy rights. The court stated that the “highly invasive” bulk storage of private data “exceeds the limits of what is strictly necessary and cannot be considered to be justified, within a democratic society.”

Fuente: In Major Privacy Victory, Top EU Court Rules Against Mass Surveillance


With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?

Policymakers have given a great deal of attention to the cyber security of governments, critical infrastructure, military targets and commercial enterprises. But civil society groups are also under threat, including human rights defenders, environmental activists, political watchdogs, and other groups promoting the rule of law and democracy.What can be done about these digital threats to civil society around the world?

Fuente: With authoritarianism and state surveillance on the rise, how can civil society be protected from digital threats?


The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard

In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger.

Fuente: The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard


A Macri se le tildó el voto electrónico | Página12 | La otra mirada

“Se recogieron las objeciones que los expertos informáticos presentaron en las reuniones de Comisión en cuanto a la alta vulnerabilidad de algunos de los métodos electrónicos propuestos, lo cual determina la imposibilidad del apoyo al proyecto tal cual fue aprobado por la Cámara de Diputados”, sentenciaron los senadores en un comunicado para justificar su rechazo.

Fuente: A Macri se le tildó el voto electrónico | Página12 | La otra mirada


Los peligros del voto electrónico | Derechos Digitales

El voto electrónico presenta serias vulnerabilidades que afectan directamente derechos como la privacidad, la seguridad o la protección de datos personales. El software utilizado durante las votaciones almacena datos de los y las votantes, que podrían ser usados para identificarles.

Fuente: Los peligros del voto electrónico | Derechos Digitales


U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers

Perhaps the most controversial aspect of the new law is that it will give the British government the authority to serve internet service providers with a “data retention notice,” forcing them to record and store for up to 12 months logs showing websites visited by all of their customers. Law enforcement agencies will then be able to obtain access to this data without any court order or warrant. In addition, the new powers will hand police and tax investigators the ability to, with the approval of a government minister, hack into targeted phones and computers.

Fuente: U.K. Parliament Approves Unprecedented New Hacking and Surveillance Powers


‘Extreme surveillance’ becomes UK law with barely a whimper | World news | The Guardian

A bill giving the UK intelligence agencies and police the most sweeping surveillance powers in the western world has passed into law with barely a whimper, meeting only token resistance over the past 12 months from inside parliament and barely any from outside.The Investigatory Powers Act, passed on Thursday, legalises a whole range of tools for snooping and hacking by the security services unmatched by any other country in western Europe or even the US.

Fuente: ‘Extreme surveillance’ becomes UK law with barely a whimper | World news | The Guardian


HELP US FIGHT SWEEPING STATE HACKING POWERS | Privacy International

Following on from our recent victory against unlawful surveillance by the British intelligence services, Privacy International is taking the British Government to court again. Why? Because it is using ‘general warrants’ to hack the electronic devices (computers, phones, tablets, and the increasing number of things that ‘connect’ to the internet) of sweeping groups of unidentified people at home and abroad. General warrants permit the government to target wide categories of people, places or property (e.g. all mobile phones in London) without any individualised suspicion of wrongdoing.

Fuente: HELP US FIGHT SWEEPING STATE HACKING POWERS | Privacy International


New York’s New Digital Crime Lab Is a Forensic Marvel

In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.

Fuente: New York’s New Digital Crime Lab Is a Forensic Marvel


Organizaciones Latinas preocupadas por reforma electoral argentina

Las abajo firmantes, organizaciones dedicadas a la defensa de los derechos humanos y civiles en entornos tecnológicos, expresamos nuestra profunda preocupación por el proyecto de ley argentino para la incorporación de tecnologías informáticas en la emisión del voto.Seguidamente, detallaremos tres puntos clave del proyecto aprobado en la Cámara de Diputados Argentina que tendrían un impacto negativo en los derechos fundamentales de los ciudadanos.

Fuente: Organizaciones Latinas preocupadas por reforma electoral argentina


La complicada relación entre Perú y la vigilancia, y cómo solucionarla | Hiperderecho

En Perú, un mecanismo de control débil de la vigilancia hizo caer a un primer ministro. En 2015 la revista peruana, Correo Semanal, alegó que la Dirección de Inteligencia Nacional del Perú (DINI) había espiado ilegalmente a periodistas, empresarios, legisladores, políticos y miembros de las fuerzas armadas y sus familias. La DINI accedió supuestamente a información almacenada en el registro nacional de las propiedades del Perú, y almacenó esta información en expediente de cientos de personas.

Fuente: La complicada relación entre Perú y la vigilancia, y cómo solucionarla | Hiperderecho


Privacy experts fear Donald Trump accessing global surveillance network | World news | The Guardian

Privacy activists, human rights campaigners and former US security officials have expressed fears over the prospect of Donald Trump gaining access to the vast global US and UK surveillance network.

Fuente: Privacy experts fear Donald Trump accessing global surveillance network | World news | The Guardian


Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden

While most eyes are focused on the presidential race between Hillary Clinton and Donald Trump, three major events prove how widespread, and dangerous, mass surveillance has become in the West. Standing alone, each event highlights exactly the severe threats that motivated Edward Snowden to blow his whistle; taken together, they constitute full-scale vindication of everything he’s done.

Fuente: Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden


When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers

just as Apple has come to be seen as a warrior for digital protection and privacy against overreaching government surveillance, Cellebrite is emerging as its law-and-order counterpart, endeavoring to build tools to break through the barriers Apple and other phone makers erect to protect data.

Fuente: When the FBI Has a Phone It Can’t Crack, It Calls These Israeli Hackers


South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.

Fuente: South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities


How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian

The how-old.net website – which uses photos to judge your age – didn’t work for me. For women and refugees, of course, there’s the Daily Mail

Fuente: How old do you look? I wouldn’t ask the internet | Tim Dowling | Opinion | The Guardian


Ojos que no parpadean: El estado de la vigilancia en América Latina | Electronic Frontier Foundation

Estamos orgullosos de anunciar el lanzamiento de “Ojos que no parpadean: El estado de la vigilancia en América Latina”, un proyecto que analiza las leyes y prácticas de vigilancia en doce países de América Latina. Por más de un año, EFF trabajó con nuestros partners en América Latina (Red en Defensa de los Derechos Digitales, Fundación Karisma, TEDIC, Centro de Estudios en Libertad de Expresión y Acceso a la Información, Hiperderecho, Derechos Digitales, InternetLab, Fundación Acceso), documentando y publicando informes individuales que analizaban el estado de la vigilancia en doce países. Entonces, a partir de esa investigación, EFF elaboró ​un informe más amplio que compara las leyes y prácticas de vigilancia en Argentina, Brasil, Chile, Colombia, El Salvador, Guatemala, Honduras, Perú, México, Nicaragua, Paraguay y Uruguay.

Fuente: Ojos que no parpadean: El estado de la vigilancia en América Latina | Electronic Frontier Foundation


Derechos Humanos y vigilancia en América Latina, un panorama preocupante | Derechos Digitales

América Latina tiene un triste historial de autoritarismo y gobiernos que han buscado utilizar el aparato estatal para controlar a sus ciudadanos. Más preocupante que esta constatación es el hecho de que, pasadas varias décadas del período dictatorial de nuestro continente, los gobiernos latinoamericanos parecen empecinados en retroceder, en vez de avanzar, en estándares de Derechos Humanos en temas de vigilancia y privacidad.

Fuente: Derechos Humanos y vigilancia en América Latina, un panorama preocupante | Derechos Digitales


ACLU Wants 23 Secret Surveillance Laws Made Public

“The people of this country can’t hold the government accountable for its surveillance activities unless they know what our laws allow,” said Patrick Toomey, a staff attorney with the ACLU’s National Security Project. “These secret court opinions define the limits of the government’s spying powers. Their disclosure is essential for meaningful public oversight in our democracy.”

Fuente: ACLU Wants 23 Secret Surveillance Laws Made Public


Ecuador: ¿protección de datos personales o censura? | Derechos Digitales

En la Asamblea Nacional de Ecuador se propuso una ley para proteger la intimidad y privacidad en los datos personales. Sin embargo, algunos de los artículos ponen en riesgo la libertad de expresión y acceso a la información en internet.

Fuente: Ecuador: ¿protección de datos personales o censura? | Derechos Digitales


Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian

The FBI has contracted out with a private firm to handle, distribute and monitor highly sensitive surveillance documents, in an arrangement veteran FBI agents consider a potential privacy and counterintelligence risk.

Fuente: Security fears over FBI contracting out highly sensitive surveillance documents | US news | The Guardian


Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian

Finally, Yahoo’s possible betrayal of its users is another example of why whistleblowers and leaks to the press are so important. The US government considers this type of surveillance “legal” even though it shocks the conscience of many ordinary Americans and dozens of civil liberties groups have been attempting to have courts rule it illegal for years.

Fuente: Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian


Experto y protección de datos personales en internet: hay una ley muy obsoleta en Chile

Ayer se realizó el seminario internacional “Dignidad en internet: derecho al olvido versus derecho a la información”, encuentro que proponía un debate público sobre la protección de las personas en la web para avanzar hacia una legislación que regule estas materias en Chile.

Fuente: Experto y protección de datos personales en internet: hay una ley muy obsoleta en Chile